Rethinking Security for the Mobile and Cloud Era

Rethinking Security for the Mobile and Cloud Era

Medieval security might seem primitive by today’s standards, but it was quite effective in its day. Castles were surrounded by a high wall and moat (dragon optional), and sentries were posted at the gate to demand the identity of a visitor before lowering the...
Centralized Policy Management

Centralized Policy Management

Centralized Policy Management and Granular Controls Essential for BYOD The 2018 BYOD report from Bitglass finds that 85 percent of organizations now allow users to access corporate data from their personal devices. What’s more, organizations are extending the Bring...
Cerium Expands into Utah

Cerium Expands into Utah

Headquartered in Spokane, WA, Cerium Networks operates from eight offices across the Northwest, employing more than 175 technology professionals, including some of the most highly skilled engineers and solutions architects in the industry. Cerium recently expanded its...
Cisco DNA Automation

Cisco DNA Automation

Reduce Complexity and Increase Network Automation with Cisco DNA Emerging technologies are enabling businesses to fundamentally change how they operate and deliver value, but they are also making network management vastly more complex. Increased automation is...
Cisco AMP Continuous Monitoring

Cisco AMP Continuous Monitoring

Cisco AMP Protects Your Network Before, During and After an Attack Most people think of a malware scan as something that happens at a predetermined time, or when files enter the network. For example, antimalware software is often set to run once a day on a particular...